• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611

Networking in 2023

Smart Applications and Data Analysis: 4th International Conference, Sadasc 2022, Marrakesh, Morocco, September 22-24, 2022, Proceedings by
Science of Cyber Security - Scisec 2022 Workshops: Ai-Cryptosec, Ta-Bc-Nft, and Mathsci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, Revised Selecte by
Optimization, Learning Algorithms and Applications: Second International Conference, Ol2a 2022, Póvoa de Varzim, Portugal, October 24-25, 2022, Procee by
Internet of Things - Iciot 2022: 7th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Cognitive Computing - ICCC 2022: 6th International Conference, Held as Part of the Services Conference Federation, Scf 2022, Honolulu, Hi, Usa, Decemb by
Advances in Service-Oriented and Cloud Computing: International Workshops of Esocc 2022, Wittenberg, Germany, March 22-24, 2022, Revised Selected Pape by
Computing, Communication and Learning: First International Conference, Cocole 2022, Warangal, India, October 27-29, 2022, Proceedings by
Human Centered Computing: 7th International Conference, Hcc 2021, Virtual Event, December 9-11, 2021, Revised Selected Papers by
The Evolution of Pervasive Information Systems by
Secure It Systems: 27th Nordic Conference, Nordsec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings by
Cloud Computing and Services Science: 11th International Conference, Closer 2021, Virtual Event, April 28-30, 2021, Revised Selected Papers by
ICT Innovations 2022. Reshaping the Future Towards a New Normal: 14th International Conference, ICT Innovations 2022, Skopje, Macedonia, September 29 by
Bioinformatics Research and Applications: 18th International Symposium, Isbra 2022, Haifa, Israel, November 14-17, 2022, Proceedings by
Cryptography, Codes and Cyber Security: First International Conference, I4cs 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings by
Internet of Things: 5th the Global Iot Summit, Giots 2022, Dublin, Ireland, June 20-23, 2022, Revised Selected Papers by
Distributed Computer and Communication Networks: Control, Computation, Communications: 25th International Conference, Dccn 2022, Moscow, Russia, Septe by
Cellular Vehicle-To-Everything (C-V2x) by Hu, Jinling, Zhao, Li, Chen, Shanzhi
Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on Mind 2021 by
Early Soft Error Reliability Assessment of Convolutional Neural Networks Executing on Resource-Constrained Iot Edge Devices by Ost, Luciano, Reis, Ricardo, Abich, Geancarlo
Computer Vision and Machine Intelligence Paradigms for Sdgs: Select Proceedings of Icrtac-Cvmip 2021 by
High Performance Computing. Isc High Performance 2022 International Workshops: Hamburg, Germany, May 29 - June 2, 2022, Revised Selected Papers by
Visual Data Insights Using SAS Ods Graphics: A Guide to Communication-Effective Data Visualization by Bessler, Leroy
Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings by
Advances in Artificial Intelligence - Iberamia 2022: 17th Ibero-American Conference on Ai, Cartagena de Indias, Colombia, November 23-25, 2022, Procee by
Signal Integrity: Applied Electromagnetics and Professional Practice by Russ, Samuel H.
Network Automation with Go: Learn how to automate network operations and build applications using the Go programming language by Leiva, Nicolas, Kashin, Michael
Proceedings of Data Analytics and Management: Icdam 2021, Volume 1 by
Critical Infrastructure Protection XV: 15th Ifip Wg 11.10 International Conference, Iccip 2021, Virtual Event, March 15-16, 2021, Revised Selected Pap by
Intelligent Computing and Communication for the Internet of Vehicles by Li, Mushu, Gao, Jie, Shen
Game Theory for Networks: 11th International Eai Conference, Gamenets 2022, Virtual Event, July 7-8, 2022, Proceedings by
Electronic Participation: 14th Ifip Wg 8.5 International Conference, Epart 2022, Linköping, Sweden, September 6-8, 2022, Proceedings by
Connecting the Internet of Things: Iot Connectivity Standards and Solutions by Kumar, Anil, Hussain, Jafer, Chun, Anthony
Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and IOS Application Security, and Break Wep by El Fiky, Ahmed Hashem
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence Using Sip: Scalable Distributed Applications and Media by Ranjan Roy, Radhika
Cloud VR: Technology and Application by Huang, Kun, Xiong, Huaping, Li, Dawei
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control by
The Internet of Materials by
Smart Grid in IoT-Enabled Spaces: The Road to Intelligence in Power by Al-Turjman, Fadi
Innovative Smart Healthcare and Bio-Medical Systems: AI, Intelligent Computing and Connected Technologies by
Recent Trends in Image Processing and Pattern Recognition: 5th International Conference, Rtip2r 2022, Kingsville, Tx, Usa, December 1-2, 2022, Revised by
Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems by
Arithmetic of Finite Fields: 9th International Workshop, Waifi 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers by
Advancements in Smart Computing and Information Security: First International Conference, Ascis 2022, Rajkot, India, November 24-26, 2022, Revised Sel by
Wireless Localization Techniques by Tong, Xinyu, Tian, Xiaohua, Wang, Xinbing
Cloud Computing by Upadhyay, Anurag, Kumar, Anshul
Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Second Eai International Conference, Bigiot-Edu 2022, Virtu by
Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Second Eai International Conference, Bigiot-Edu 2022, Virtu by
Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Second Eai International Conference, Bigiot-Edu 2022, Virtu by
Microsoft Azure for Dummies by Hyman, Jack A.
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I by
Machine Learning for Cyber Security: 4th International Conference, Ml4cs 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III by
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Cambric, Shinesa, Ratemo, Michael
Artificial General Intelligence: 15th International Conference, Agi 2022, Seattle, Wa, Usa, August 19-22, 2022, Proceedings by
Analyzing Digital Discourses: Between Convergence and Controversy by
Implementing and Leveraging Blockchain Programming by
Frontiers of Data and Knowledge Management for Convergence of Ict, Healthcare, and Telecommunication Services by
Wie kommt Ethik in die künstliche Intelligenz? Prinzipien, Merkmale und Leitlinien einer ethischen KI by Anonymous
Image Processing and Intelligent Computing Systems by
Optisystem Program for Various Fiber Optic Modeling by Kurnaz, Sefer, Abdu Ibrahim, Abdullahi, Muataz Abdulwahid, Maan
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, Mind 2022, Virtual Event, January 19-20, 2023, P by
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, Mind 2022, Virtual Event, January 19-20, 2023, P by
Security in Smart Home Networks by Shen, Meng, Yan, Zhu, Haojin
Silicon Valley Cybersecurity Conference: Third Conference, Svcc 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers by
Algorithms for Big Data: Dfg Priority Program 1736 by
Data Mining and Big Data: 7th International Conference, Dmbd 2022, Beijing, China, November 21-24, 2022, Proceedings, Part I by
Community Engagement in the Online Space by
Industrial IoT for Architects and Engineers: Architecting secure, robust, and scalable industrial IoT solutions with AWS by Bernal, Joey, Sridhar, Bharath
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Hardt, Robert, Pandit, Parth
Transactions on Computational Collective Intelligence XXXVII by
Mastering Python Networking - Fourth Edition: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management by Chou, Eric
The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases by
High-Performance It Services by Critchley, Terry
Кооперативная связь в ко by &#1055&#1088&#1072&#1090&#1072&#1087 &#1050., Бе, &#1051&#1077&#1090 &#1043., Шине, &#1041&#1072&#1083&#1072 &#1043., Джо&#107
Kooperative Kommunikation in kognitiven 5G-Funksystemen by Pratap C., Benin, Let G., Shine, Bala G., Josemin
Comunicação Cooperativa em Sistemas de Rádio Cognitivo 5G by Pratap C., Benin, Let G., Shine, Bala G., Josemin
Communication coopérative dans les systèmes radio cognitifs 5G by Pratap C., Benin, Let G., Shine, Bala G., Josemin
Comunicazione cooperativa nei sistemi radio cognitivi 5G by Pratap C., Benin, Let G., Shine, Bala G., Josemin
Advancements in Interdisciplinary Research: First International Conference, Air 2022, Prayagraj, India, May 6-7, 2022, Revised Selected Papers by
Fast and Low-Resource Semi-Supervised Abdominal Organ Segmentation: Miccai 2022 Challenge, Flare 2022, Held in Conjunction with Miccai 2022, Singapore by
Artificial Life and Evolutionary Computation: 15th Italian Workshop, Wivace 2021, Winterthur, Switzerland, September 15-17, 2021, Revised Selected Pap by
Human-Computer Interaction: 8th Iberoamerican Workshop, Hci-Collab 2022, Havana, Cuba, October 13-15, 2022, Revised Selected Papers by
Анализ научных данных с &#1087 by Сюй, Цяньв&#, Чанг, Викт&#, Сонгала, Е&#
Wissenschaftliche Datenanalyse mit NEO4J by Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Analyse de données scientifiques à l'aide de NEO4J by Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Analisi dei dati scientifici con NEO4J by Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Análise de dados científicos usando o NEO4J by Xu, Qianwen Ariel, Chang, Victor, Songala, Yeshwanth Kumar
Compliance Made Easy by Cybersecurity Experts, Leading
Cloud Computing by Upadhyay, Anurag, Kumar, Anshul
Enhanced Cyber Security in IoT Using Deep Belief Network by P. M., Prathibhavani
Artificial Intelligence and Soft Computing: 21st International Conference, Icaisc 2022, Zakopane, Poland, June 19-23, 2022, Proceedings, Part I by
Collaborative Computing: Networking, Applications and Worksharing: 18th Eai International Conference, Collaboratecom 2022, Hangzhou, China, October 15 by
Computer Performance Engineering: 18th European Workshop, Epew 2022, Santa Pola, Spain, September 21-23, 2022, Proceedings by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
JN0-104 Junos, Associate (JNCIA-Junos): Best Practice Exams by Ya, Son
High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production: 12th International Conference, Hpcst by
Emerging Technologies in Computing: 5th Eai International Conference, Icetic 2022, Chester, Uk, August 15-16, 2022, Proceedings by
Смягчение атак в архитек by Шоу, Дилип &
Atténuation des attaques dans l'architecture NDN à l'aide de techniques de filtrage d'eau by Shaw, Dilip Kumar
Atenuação de ataques na Arquitectura NDN utilizando Técnicas de Marca de Água by Shaw, Dilip Kumar
Mitigazione degli attacchi nell'architettura NDN mediante tecniche di watermarking by Shaw, Dilip Kumar
Pattern Recognition Applications and Methods: 10th International Conference, Icpram 2021, and 11th International Conference, Icpram 2022, Virtual Even by
Entschärfung von Angriffen in der NDN Architektur durch Wasserzeichen Techniken by Shaw, Dilip Kumar
Applied Technologies: 4th International Conference, iCat 2022, Quito, Ecuador, November 23-25, 2022, Revised Selected Papers, Part I by
Statistical Atlases and Computational Models of the Heart. Regular and Cmrxmotion Challenge Papers: 13th International Workshop, Stacom 2022, Held in by
Applied Technologies: 4th International Conference, iCat 2022, Quito, Ecuador, November 23-25, 2022, Revised Selected Papers, Part III by
Intelligent Networked Things: 5th China Conference, Cint 2022, Urumqi, China, August 7-8, 2022, Revised Selected Papers by
Microsoft 365 Administration Inside Out by Kegg, Darryl, Fisher, Ed, Guilmette, Aaron
Social Networking Sites, Body Image and Wellbeing: The Roles of Social by Walker, Mary
Smart Card Research and Advanced Applications: 21st International Conference, Cardis 2022, Birmingham, Uk, November 7-9, 2022, Revised Selected Papers by
The Recent Advances in Transdisciplinary Data Science: First Southwest Data Science Conference, Sdsc 2022, Waco, Tx, Usa, March 25-26, 2022, Revised S by
Applied Technologies: 4th International Conference, iCat 2022, Quito, Ecuador, November 23-25, 2022, Revised Selected Papers, Part II by
Trustworthy Autonomic Computing by Eze, Thaddeus
The Spatial Grasp Model: Applications and Investigations of Distributed Dynamic Worlds by Sapaty, Peter Simon
Machine Learning and Principles and Practice of Knowledge Discovery in Databases: International Workshops of Ecml Pkdd 2022, Grenoble, France, Septemb by
Multiple Routing Configurations for Fast IP recovery in Ad Hoc Network by L, Raghavendar Raju
Artificial Intelligence in Data Mining Techniques by Refonaa, J., Dhamodaran, S., Yovan Felix, A.
Machine Learning and Principles and Practice of Knowledge Discovery in Databases: International Workshops of Ecml Pkdd 2022, Grenoble, France, Septemb by
Emerging Technologies for Authorization and Authentication: 5th International Workshop, Etaa 2022, Copenhagen, Denmark, September 30, 2022, Revised Se by
Advances in Cryptology - Asiacrypt 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, T by
Visual Inference for Iot Systems: A Practical Approach by Fernández-Berni, Jorge, Rodríguez-Vázquez, Angel, Velasco-Montero, Delia
6G Enabling Technologies: New Dimensions to Wireless Communication by
Mobile Multimedia Communications: 15th Eai International Conference, Mobimedia 2022, Virtual Event, July 22-24, 2022, Proceedings by
Emerging Networking Architecture and Technologies: First International Conference, Icenat 2022, Shenzhen, China, November 15-17, 2022, Proceedings by
Medical Applications with Disentanglements: First Miccai Workshop, Mad 2022, Held in Conjunction with Miccai 2022, Singapore, September 22, 2022, Proc by
Green, Pervasive, and Cloud Computing: 17th International Conference, Gpc 2022, Chengdu, China, December 2-4, 2022, Proceedings by
Agile Methods: 11th Brazilian Workshop, Wbma 2021, Virtual Event, October 8-10, 2021, Revised Selected Papers by
Product Lifecycle Management. Plm in Transition Times: The Place of Humans and Transformative Technologies: 19th Ifip Wg 5.1 International Conference, by
Innovations and Interdisciplinary Solutions for Underserved Areas: 5th Eai International Conference, Intersol 2022, Abuja, Nigeria, March 23-24, 2022, by
Nordic Artificial Intelligence Research and Development: 4th Symposium of the Norwegian AI Society, Nais 2022, Oslo, Norway, May 31 - June 1, 2022, Re by
Current Trends in Web Engineering: Icwe 2022 International Workshops, Becs, Sweet and Wals, Bari, Italy, July 5-8, 2022, Revised Selected Papers by
Social Robotics: 14th International Conference, Icsr 2022, Florence, Italy, December 13-16, 2022, Proceedings, Part II by
Applied Intelligence and Informatics: Second International Conference, Aii 2022, Reggio Calabria, Italy, September 1-3, 2022, Proceedings by
Computer Vision, Imaging and Computer Graphics Theory and Applications: 16th International Joint Conference, Visigrapp 2021, Virtual Event, February 8 by
Biomedical and Computational Biology: Second International Symposium, Becb 2022, Virtual Event, August 13-15, 2022, Revised Selected Papers by
4th International Conference on Wireless, Intelligent and Distributed Environment for Communication: Widecom 2021 by
Image and Vision Computing: 37th International Conference, Ivcnz 2022, Auckland, New Zealand, November 24-25, 2022, Revised Selected Papers by
Information Security Applications: 23rd International Conference, Wisa 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers by
Learning and Intelligent Optimization: 16th International Conference, Lion 16, Milos Island, Greece, June 5-10, 2022, Revised Selected Papers by
Access Control Models and Architectures for Iot and Cyber Physical Systems by Gupta, Maanak, Bhatt, Smriti, Alshehri, Asma Hassan
Maschinelles Lernen by Dhanalakshmi, R., Soundari, A. Gnana
Apprentissage Machine by Soundari, A. Gnana, Dhanalakshmi, R.
Apprendimento Automatico by Soundari, A. Gnana, Dhanalakshmi, R.
Aprendizagem de Máquinas by Dhanalakshmi, R., Soundari, A. Gnana
МАШИННОЕ ОБУЧЕНИЕ by Саундари, &#, Дханалак&#10
Decision and Game Theory for Security: 13th International Conference, Gamesec 2022, Pittsburgh, Pa, Usa, October 26-28, 2022, Proceedings by
Implementing Cellular IoT Solutions for Digital Transformation: Successfully develop, deploy, and maintain LTE and 5G enterprise IoT systems by McCain, Dennis
Cloud-Computing by Upadhyay, Anurag, Kumar, Anshul
Informatique En Nuage by Upadhyay, Anurag, Kumar, Anshul
Cloud Computing by Kumar, Anshul, Upadhyay, Anurag
Computação Em Nuvem by Upadhyay, Anurag, Kumar, Anshul
ОБЛАЧНЫЕ ВЫЧИСЛЕНИЯ by УПАДХЫАЫ, &#, КУМАР, АНС&#
Practical Rust 1.x Cookbook: 100+ Solutions across Command Line, CI/CD, Kubernetes, Networking, Code Performance and Microservices by Team, Rustacean
New Trends in Computer Technologies and Applications: 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedi by
Software Defined Networking for AD Hoc Networks by
Cloud Computing Playbook: 10 In 1 Practical Cloud Design With Azure, Aws And Terraform by Miller, Richie
Computational Data and Social Networks: 11th International Conference, Csonet 2022, Virtual Event, December 5-7, 2022, Proceedings by
Разработка новой модели by Иссак, Фра&#, Ишвария, &#1052.
Desenvolvimento de Modelo Novel para Usuários Confiáveis Recomendação em OSN by Ishwariya, M., Issac, Franklin
Entwicklung eines neuartigen Modells für die Empfehlung vertrauenswürdiger Nutzer in OSN by Ishwariya, M., Issac, Franklin
Sviluppo di un nuovo modello per la raccomandazione di utenti affidabili in OSN by Ishwariya, M., Issac, Franklin
Client Logbook: A client log book is a written record of a client's interactions with a particular service or organization. by Publishing, Myjwc
Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks by Fahmy, Hossam Mahmoud Ahmad
Développement d'un nouveau modèle pour la recommandation d'utilisateurs fiables dans les OSN by Issac, Franklin, Ishwariya, M.
Городские приложения by Мерсье, Си&#, Росарио, Ж&#
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part I by
Advanced Communication and Intelligent Systems: First International Conference, Icacis 2022, Virtual Event, October 20-21, 2022, Revised Selected Pape by
Content Distribution for Mobile Internet: A Cloud-Based Approach by Dai, Yafei, Chen, Guihai, Li, Zhenhua
IoT avec les balises BLE by Padiya, S. D., Gulhane, V. S.
Matrix and Analytical Methods for Performance Analysis of Telecommunication Systems by Gaidamaka, Yuliya, Yarkina, Natalia, Naumov, Valeriy
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V by
Intelligent Robotics: Third China Annual Conference, Ccf Cirac 2022, Xi'an, China, December 16-18, 2022, Proceedings by
Computer Security. Esorics 2022 International Workshops: Cybericps 2022, Secpre 2022, Spose 2022, Cps4cip 2022, Cdt&secomane 2022, Eis 2022, and Secas by
Wireless Internet: 15th Eai International Conference, Wicon 2022, Virtual Event, November 2022, Proceedings by
Техника стандартизации & by Ишвария, &#1052., Иссак, &#1056. Фр&
Eine Technik zur Standardisierung von Big Data für Datenmanagement-Anwendungen by Ishwariya, M., Issac, R. Franklin
Une technique de normalisation du Big Data pour l'application de gestion des données by Issac, R. Franklin, Ishwariya, M.
Una tecnica di standardizzazione dei Big Data per le applicazioni di gestione dei dati by Issac, R. Franklin, Ishwariya, M.
Uma Grande Técnica de Padronização de Dados para Aplicação de Gestão de Dados by Ishwariya, M., Issac, R. Franklin
Cisco Cloud Infrastructure by Shukla, Avinash, Patel, Jalpa, Panzade, Komal
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers by
Computer Vision - Eccv 2022 Workshops: Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part VI by
Künstliche Intelligenz: Das Wichtigste, was Du wissen musst by Simon, Walter
Биологически вдохновле&# by ДЭВИ, &#1042. Соу&, КУМАР, &#1063. Ни&
Обеспечение качества си& by &#1056. &#1043., Бабука&
Взаимодействие на основ& by Кумар Пар&#1, Нандихал, &#, Г К, Сухас
Qualitätssicherung eines agentenbasierten Systems by R. G., Babukarthik Sridevi
Garantia de qualidade do sistema baseado em agentes by R. G., Babukarthik Sridevi
Bio-inspiriertes und vertrauensbasiertes Clustering-Routing-Protokoll by Devi, V. Sowmya, Kumar, Ch Niranjan
Protocolo de roteamento de cluster baseado em confiança e bioinspirado by Devi, V. Sowmya, Kumar, Ch Niranjan
Empfehlungsbasierte Interaktion by Kumar Pareek, Piyush, Nandihal, Priya, G. K., Suhas
Interaction basée sur les recommandations by Kumar Pareek, Piyush, Nandihal, Priya, G. K., Suhas
Interazione basata su raccomandazioni by Nandihal, Priya, G. K., Suhas, Kumar Pareek, Piyush
Interação Baseada em Recomendação by Nandihal, Priya, G. K., Suhas, Kumar Pareek, Piyush
Protocole de routage de clustering bio-inspiré et basé sur la confiance by Kumar, Ch Niranjan, Devi, V. Sowmya
Protocollo di routing di clustering basato su bio-ispirazione e fiducia by Devi, V. Sowmya, Kumar, Ch Niranjan
Assurance de la qualité des systèmes basés sur des agents by R. G., Babukarthik Sridevi
Garanzia di qualità del sistema ad agenti by R. G., Babukarthik Sridevi
A Proactive Network Surveillance Framework by Singh, Maninder
See More